ONE Day Training Series

Android Hacking
This training shows you how does the Android platform can be hack using the necessary tools and exploits. It ensures that participant will know the techniques of mobile hacking and also learning how to defend before it happens.

Topics to be covered:

Android security architecture

Attacking Android platform

Hacking with Android

Penetration testing on Android application

Hack in the air!
This training focuses on today’s top security concerns and how hackers penetrate into desktop, laptop and corporate network. It will teach the participants the common cyber-attacks using the latest technology tools and the best way to defend against an attack!

Topics to be covered:

Google hacking

Sniffing

Phishing

Password cracking

Wireless hacking

Memory Forensic
In this training, participants will expose the method to acquire RAM contents, searching relevant evidences by analyzing the content (running processes, registry details, passwords and even to uncover rootkit). Today, “Pull-the-plug” is no longer the ultimate solution to first responder.

Topics to be covered:

Typical incident response activities

Memory architecture

Memory extraction

Dealing with malware

Password extraction

Code injection analysis

Top Web Application Attacks!
This training focuses on the process of hacking web applications and probing for common vulnerabilities. You will learn advanced exploitation techniques to gain access to a system without any login credentials. Meanwhile, countermeasure for security threats in applications will be covered as well.

Topics to be covered:

Web Application Basics

Cross site scripting (XSS)

SQL injection

File inclusion

Common execution

Cross site request forgery (CSRF)

Attacking using Burp Suite

Hacking and Hardening Linux and Windows Server
This training gives you the insights of the most common attacks on Linux and Windows severs that we come across in our daily life. It provides you the opportunity to experience practical attacks such as X11 attacks, weak services, privilege escalation etc. You will also learn numerous countermeasures to harden your Linux and Windows servers.

Topics to be covered:

Linux security features

Windows security features

Local attacks

Remote attacks

Hardening Linux and Windows server

Automating Pentesting with Scripting “Kung Fu”
In this training, you will be learn necessary knowledge from basics of automating standard security assessment to advanced penetration testing techniques. It provides you the foundation to conduct a penetration testing.